Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average.
References
[1]
Alam, K., Nushrat, S., Patwary, A.H., Ullah, A. and Robin, K.H. (2022) An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud. Proceedings of the Second InternationalConferenceonAdvancedNetworkTechnologiesandIntelligentComputing, Varanasi, 22-24 December 2022, 215-233. https://doi.org/10.1007/978-3-031-28180-8_15
[2]
Hossain, S., Islam, S., Ullah, A. and Hossain, A. (2022) Design and Development of a Hybrid Intrusion Detection and Prevention System for Cloud Computing and Internet of Things Environment. Recent Innovations in Wireless Network Security, 4, 1-9. https://zenodo.org/records/6796201
[3]
Apar, N.M., Munna, M.I., Ullah, A. and Rahman, H. (2022) Design and Development of a Dynamic Hashing Algorithm. International Journal of Scientific Research in Computer Science and Engineering, 10, 8-14. https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2690
[4]
Hossain, M.A., Ullah, A., Hossain, S., Begum, S. and Ibrahim. (2021) Design and Development of a Novel Symmetric Algorithm for Enhancing Information Security. International Journal of Communication and Information Technology, 2, 49-60. https://doi.org/10.33545/2707661X.2021.v2.i1a.40
[5]
Hossain, M., Ullah, A., Khan, N. and Alam, M. (2019) Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing. Journal of Information Security, 10, 199-236. https://doi.org/10.4236/jis.2019.104012
[6]
Ficco, M., Tasquier, L. and Aversa, R. (2013) Intrusion Detection in Cloud Computing. Proceedings of the 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne, 28-30 October 2013, 276-283. https://doi.org/10.1109/3PGCIC.2013.47
[7]
Moyou Metcheka, L. and Ndoundam, R. (2020) Distributed Data Hiding in Multi-Cloud Storage Environment. JournalofCloudComputing, 9, Article No. 38. https://doi.org/10.1186/s13677-020-00208-4
[8]
Awadh, W.A. and Hashim, A.S. (2017) Using Steganography for Secure Data Storage in Cloud Computing. InternationalResearchJournalofEngineeringandTechnology (IRJET), 4, 3668-3672. https://www.irjet.net/archives/V4/i4/IRJET-V4I4885.pdf
[9]
Ranjan, A. and Bhonsle, M. (2016) Advanced Technics to Shared & Protect Cloud Data Using Multilayer Steganography and Cryptography. Proceedings of the 2016 InternationalConferenceonAutomaticControlandDynamicOptimizationTechniques (ICACDOT), Pune, 9-10 September 2016, 35-41. https://doi.org/10.1109/ICACDOT.2016.7877547
[10]
Kumar, K. (2017) Intrusion Detection and Prevention System in Enhancing Security of Cloud Environment. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 6, 1138-1152. https://www.researchgate.net/publication/320331566_Intrusion_Detection_and_Prevention_System_in_enhancing_Security_of_Cloud_Environment
[11]
Sarker, M.K. and Chatterjee, T. (2014) Enhancing Data Storage Security in Cloud Computing through Steganography. https://www.researchgate.net/publication/315850425_Enhancing_Data_Storage_Security_in_Cloud_Computing_Through_Steganography
[12]
Khan, M.A. (2021) Information Security for Cloud Using Image Steganography. Lahore Garrison University Research Journal of Computer Science and Information Technology, 5, 9-14. https://doi.org/10.54692/lgurjcsit.2021.0501171
[13]
Abbas, M.S., Mahdi, S.S. and Hussien, S.A. (2020) Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography. Proceedings of the 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, 16-18 April 2020, 123-127. https://doi.org/10.1109/CSASE48920.2020.9142072
[14]
Ahmed, O.M. and Abduallah, W.M. (2017) A Review on Recent Steganography Techniques in Cloud Computing. Academic Journal of Nawroz University, 6, 106-111. https://doi.org/10.25007/ajnu.v6n3a91
[15]
Pant, V.K., Prakash, J. and Asthana, A. (2015) Three Step Data Security Model for Cloud Computing Based on RSA and Steganography. Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, 8-10 October 2015, 490-494. https://doi.org/10.1109/ICGCIoT.2015.7380514